CVE-2025-54309
- EPSS 50.66%
- Published 18.07.2025 00:00:00
- Last modified 25.09.2025 18:03:51
CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025.
- EPSS 0.44%
- Published 15.04.2025 00:00:00
- Last modified 13.06.2025 12:43:22
CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows directory traversal via the /WebInterface/function/ URI to read files accessible by SMB at UNC share pathnames, bypassing SecurityManager restrictions.
- EPSS 0.07%
- Published 15.04.2025 00:00:00
- Last modified 13.06.2025 12:49:10
CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the host and port parameters in a command=telnetSocket request to the /WebInterface/function/ URI.
CVE-2025-31161
- EPSS 84.41%
- Published 03.04.2025 00:00:00
- Last modified 21.04.2025 21:03:07
CrushFTP 10 before 10.8.4 and 11 before 11.3.1 allows authentication bypass and takeover of the crushadmin account (unless a DMZ proxy instance is used), as exploited in the wild in March and April 2025, aka "Unauthenticated HTTP(S) port access." A r...
CVE-2025-2825
- EPSS 5.28%
- Published 26.03.2025 15:58:14
- Last modified 02.04.2025 21:15:33
CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0 are affected by a vulnerability in the S3 authorization header processing that allows authentication bypass. Remote and unauthenticated HTTP requests to CrushFTP with known usernames c...
CVE-2024-11986
- EPSS 0.95%
- Published 13.12.2024 14:15:21
- Last modified 13.12.2024 14:15:21
Improper input handling in the 'Host Header' allows an unauthenticated attacker to store a payload in web application logs. When an Administrator views the logs using the application's standard functionality, it enables the execution of the payload, ...
CVE-2024-53552
- EPSS 0.23%
- Published 10.12.2024 02:15:17
- Last modified 27.06.2025 17:58:40
CrushFTP 10 before 10.8.3 and 11 before 11.2.3 mishandles password reset, leading to account takeover.
CVE-2024-22910
- EPSS 0.37%
- Published 14.05.2024 14:58:26
- Last modified 13.06.2025 12:52:26
Cross Site Scripting (XSS) vulnerability in CrushFTP v.10.6.0 and v.10.5.5 allows an attacker to execute arbitrary code via a crafted payload.
- EPSS 94.43%
- Published 22.04.2024 20:15:07
- Last modified 27.01.2025 21:48:42
A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain a...
CVE-2023-48795
- EPSS 64.06%
- Published 18.12.2023 16:15:10
- Last modified 29.09.2025 21:56:10
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...